Essays about: "auditing security"

Showing result 1 - 5 of 15 essays containing the words auditing security.

  1. 1. A study of Oracle Cloud Infrastructure : Demonstration of the vulnerability or reliability of certain services through penetration attacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Shanly Feller; [2023]
    Keywords : Oracle Cloud Infrastructure; penetration testing; security practices; cloud security; vulnerability assessment.;

    Abstract : This thesis aims to assess the security of Oracle Cloud Infrastructure (OCI) through penetration testing of some of its services. Targeted at cloud, cybersecurity, governance, and compliance professionals as well as administrators or cyber enthusiasts in general, this research uncovers specific best practices to OCI. READ MORE

  2. 2. Internal Auditing in a digitalised world : A qualitative study about the internal auditor´s approach in providing assurance of cybersecurity

    University essay from Uppsala universitet/Företagsekonomiska institutionen

    Author : Priyanka Poddar; [2022]
    Keywords : cybersecurity activity; cybersecurity assurance; internal auditing; information security;

    Abstract : This study aims to contribute to internal auditing´s body of knowledge. This will be done by identifying and evaluating the approaches taken by internal auditors in assuring in the management of an organisation's cybersecurity. Qualitative research has been undertaken for this study by collecting data through semistructured interviews. READ MORE

  3. 3. Keeping an Indefinitely Growing Audit Log

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Måns Andersson; [2022]
    Keywords : Cryptography; Audit Log; Tamper-evident; Merkle tree; Kryptografi; Granskningslogg; Manipuleringsupptäckbarhet; Merkle träd;

    Abstract : An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. READ MORE

  4. 4. Analysing privacy concerns in smartcameras : in correlation with GDPR and Privacy by Design

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Sebastian Floderus; Vincent Tewolde; [2021]
    Keywords : Privacy by Design; GDPR; IoT; security; data management;

    Abstract : Background. The right to privacy is every persons right, data regulation laws suchas the GDPR and privacy preserving concepts like Privacy by Design (PbD) aid inthis matter. IoT devices are highly vulnerable to attacks because of their limitedstorage and processing capabilities, even more so for internet connected cameras. READ MORE

  5. 5. SHARIF: Solid Pod based Secured Healthcare Information Storage and Exchange Solution

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Munish Sharma; [2021]
    Keywords : Access management; Auditability; Decentralization; Solid Pod; Blockchain Technology; Solidity; Healthcare Data;

    Abstract : Health Informatics has enlightened by the recent development in the internet of medical things 4.0. READ MORE